Due to small issue with gxemul (PCI registers values of piix
controller are not saved having been written) FreeBSD in
gxemul panics after detecting IDE devices. Apply this patch to
fix it...
Bump PKGREVISION.
Unknown why it was using this.
This closes PR 39571 and PR 37786.
Another suggestion is to use pkgsrc's MACHINE_ARCH.
(Not completely tested on DragonFly as this still doesn't build
due to wrong gcc.)
Also note this release is not the latest.
2008-08-30
* Joystick buttons for x and y axis control can be reassigned,
too. This is especially useful if you want to use digital
buttons instead of an analog controller. Thanks to Jon Chalos.
* Fall back to non-accelerated YUV overlay, if no hardware-accelerated
is available. This is much slower but a modern machine should
be fast enough and it's better than having no fullscreen mode
at all.
* The command-line parameter '-c' wasn't handled properly, so
it didn't work at all.
* Don't link against X11 libraries if compiling the SDL
user-interface.
2007-01-18
* Applied fix by Barry for the ABCD instruction. This fixes,
for example, the odd characters in the score count of Streets
of Rage as reported by bootsector.
* Fixed soft reset so that the RAM is not cleared in this case.
Thanks to Fibonacci for reporting this.
* Reduced noisy blips that may happen whenever an underrun of
the audio buffer occurs.
* Fixed crash that would happen if the filename of the ROM did
not contain a dot.
* Fixed endian issue with big endian platforms introduced by
previous changes.
* Added simplistic support for reassigning joypad/joystick
buttons. Look for joy[12]_{a,b,c,start,left,right,up,down} in
~/.genrc.
Update xorg-x11-Mesa from 6.8.2-100 to 6.8.2-100.13.
This update fixes the following issues: X Font Server build_range()
Integer Overflow Vulnerability [IDEF2708], X Font Server
swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite
extension buffer overflow.
Update xorg-x11-libs from 6.8.2-100.2 to 6.8.2-100.13.
100.12:
Integer overflows in the XC-MISC extension of the X-server
could potentially be exploited to execute code with root
privileges (CVE-2007-1003).
Integer overflows in libX11 could cause crashes
(CVE-2007-1667).
Integer overflows in the font handling of the X-server
could potentially be exploited to execute code with root
privileges (CVE-2007-1352, CVE-2007-1351).
100.13:
This update fixes the following issues: X Font Server build_range()
Integer Overflow Vulnerability [IDEF2708], X Font Server
swap_char2b() Heap Overflow Vulnerability [IDEF2709], Composite
extension buffer overflow.
Update resmgr-0.9.8_SVN57.2 to resmgr-0.9.8_SVN57-2.3.
This update fixes the following security problem:
- resmgrd granted access to all usb devices if access to one one usb
device was granted via "usb:<bus>,<dev>" notation.
- Class specific exclude rules did not match devices that set their
class ID at interface level.
This update also fixes the following non-security bugs:
- a filedescriptor leak
- resmgrd often logged unnecessary ACL error messages
- the init script cleared /var/run/resmgr/classes even if resmgrd
was already running
Update openssl from 0.9.7g-2.12 to 0.9.7g-2.15.
2.15:
This update of openssl fixes a off-by-one buffer overflow in function
SSL_get_shared_ciphers(). This vulnerability potentially allows remote code
execution; depending on memory layout of the process. (CVE-2007-5135)
Update libpng from 1.2.8-5.2 to 1.2.8-5.6.
5.4:
Applications using libpng can crash if libpng is ask to
process a grayscale image with a malformed (bad CRC) tRNS
chunk. (CVE-2007-2445)
5.6:
Description: Speciall crafted png files could crash applications when attempting
to open such a file (CVE-2007-5269).
From cups-libs from 1.1.23-21.6 to 1.1.23-21.16.
21.8:
By keeping a partially negotiated SSL connection open an
attacker could prevent the cups server from accepting other
requests (CVE-2007-0720).
21.10:
The previous cups update (CVE-2007-0720) was incomplete and
could lead to cupsd crashing.
21.12:
A buffer overflow in the xpdf code contained in cups could
be exploited by attackers to potentially execute arbitrary
code (CVE-2007-3387).
21.14:
A missing length check in the IPP implementation of cups
could lead to a buffer overflow. Attackers could exploit
that to potentially execute arbitrary code with root
privileges (CVE-2007-4351).
21.16:
A buffer overflow in the xpdf code contained in cups could be
exploited by attackers to potentially execute arbitrary code
(CVE-2007-4352, CVE-2007-5392, CVE-2007-5393).
Bump PKGREVISION to 5.
4.9:
Check for negative number of points in contours. (CVE-2007-2754)
4.7:
fix buffer overflow in handling of bdf fonts. (CVE-2007-1351)
Changes in Version 0.4
----------------------
1. First draft of a user manual (doc/ia64user.txt)
2. Systems calls to vprintf and program exit
3. Enhancements to single step and display register commands
4. Trace level command
5. Reset hazards command
6 Various bug fixes
Changes in Version 0.5
----------------------
Supports ELF files created by the Intel IA64 Assembler. Not all relocation
types are yet supported.
Lots of changes, including
Hatari version 1.0.0
Version 1.0.0 of the Atari ST, STE, TT and Falcon emulator Hatari has
been released. A lot of things have been changed this time:
The user's configuration files are now located in the directory ~/.hatari/
[...]
Hatari version 0.95
Hatari version 0.95 has been released. This release brings you basic
Atari TT and Falcon emulation! Please note that both new emulation
modes are still highly experiemental,some few games and demos work,
but most still have more or less big problems. Basic emulation of
Falcon video shifter (Videl), NVRAM and DMA sound is in place. The
biggest drawback: There is no working Falcon DSP emulation yet.
[...]
Throw out a few options which are pointless (fixed{video,fast}ram) since they
are only minimally relevant to JIT, or broken (blitsdlblit, blitmemmove).
Patch posix shell script instead of requiring bash.
Make OpenGL support an option.
Emutos has to be downloaded from http://emutos.sourceforge.net/en/download.htm
- use SQLite3 instead of Berkeley DB
- optionally TorrentZip ROM set
- mkmamedb: add support for ROM Management Datafile format
- mkmamedb: add support to read dat files from zip archives
- mkmamedb: extract version and game description from listxml output
- ckmame: fix finding ROMs that need detectors from superfluous and extra
- change to 3-clause BSD license
This lets me launch Diablo II on an EeePC, which runs menus at 800x600 but
allows the actual game itself to run at 640x480, without hooking up an
external VGA monitor.
Add missing dep on libxml2.
Also merge some stuff from wip/wine:
- more options (esound, ldap, dbus, ssl, x11)
- split PLIST to accomodate extra files on Linux and FreeBSD (PR pkg/36320)
This also fixes the broken build against current openldap. (PR pkg/38025)
0.8.9:
Updated the included gettext library to 0.17 to fix a MinGW build
issue.
GB: Corrected a lack of address masking in most of the cart RAM
emulation code. Fixes a few Chinese GameBoy Color games.
NES: (Re?)-added support for mapper 240(it was erroneously listed
in the documentation as being supported...).
GBA: Fixed a buffer overflow in the ROM image loading code.
PC-FX: Several variables related to subchannel reading weren't
being saved in save states. Fixed. (This fixes save states made
within the BIOS' CD-DA player)
PCE: Altered how the ADPCM read and write addresses are set.
Fixes the Super CD version of "Tengai Makyou Ziria", and "CD Mahjong
Bishoujo Chuushinha". Thanks to Exophase and ChrlyMac for the
tips. ***(This change may potentially cause regressions. If it
does, please report them at http://forum.fobby.net )***
PC-FX: Fixed a few deprecated const string to char* conversions
in v810_cpuD.cpp.
PCE: Fixed a bug with Arcade Card emulation with a tip from
Exophase. The ADPCM sound effects in Garou Densetsu II work
correctly now.
PCE: Reads from the timer count register the cycle it is set to
reload after expiring will now return 0x7F. Fixes "Battle Royale".
Changes since 0.4.6.1:
* Applying a patch from Oleksandr Tymoshenko for the wdc device, fixing the
order of 16-bit words within 32-bit words in the identify struct, and the
error register is not cleared on reads any more.
* The disk device used in the test machines can now access disk images
larger than 4 GBs when emulating 32-bit architectures (as suggested by
Julian Elischer).
* For ARM emulation, a special case for PC-relative load which wasn't
implemented before has now been implemented. (The problem could be
triggered by attempting large builds using NetBSD's pkgsrc inside e.g.
NetBSD/cats.)
* The ARM 'bkpt' instruction has been implemented (patch from Jiri Svoboda).